Results 131 to 140 of about 2,849,694 (325)
A Security Architecture Research Based on Roles
Security has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, there ...
Tao Linbo +3 more
doaj +1 more source
Cloud Security and Compliance - A Semantic Approach in End to End Security
The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users’ data remains confidential and secure.
R. Kalaiprasath +2 more
semanticscholar +1 more source
Revealing Robust Room Temperature Ferromagnetism in Gd‐Doped Few‐Layered MoS2 Thin Films
Ultrahigh room‐temperature ferromagnetism is demonstrated in few‐layer 0.47% Gd‐doped MoS2 films, with a saturation magnetization of 454 emu cm−3, 11 times higher than bulk. Experimental and DFT calculations reveal that the interplay between Gd dopants and Mo, S vacancies (V1Mo+2S), forms bound magnetic polarons that drive ferromagnetic ordering ...
Aswin kumar Anbalagan +22 more
wiley +1 more source
Security Analysis in the Migration to Cloud Environments [PDF]
David G. Rosado +3 more
openalex +1 more source
Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives.
Al-Shaidy, Al Noaman M. K. +6 more
core
All‐biomass‐derived composite films are fabricated from wheat straw–derived nanocarbon spheres and cellulose nanofibers through a simple, scalable process, which exhibit superior integrated electrical–thermal–mechanical properties and can be applied as sustainable materials for flexible electronics and green packaging.
Junchao Ren +12 more
wiley +1 more source
SPARC is a soft, proprioceptive, agile robot for 3D climbing, and exploration, integrating three parallel‐configured 3D‐printed Kresling origami actuators with embedded proprioception, a dual closed‐loop feedback control system, and pneumatic suction feet, enabling precise trajectory following in 3D, smooth transitioning from the ground to the wall ...
Weicheng Fan +7 more
wiley +1 more source
Pushing Biomolecule Detection Limit With Graphene Field‐effect Transistor Biosensors
Graphene knows your health! This work presents a comprehensive overview of recent advances in graphene field‐effect transistor (GFET) biosensors for ultrasensitive biomolecule detection. How device engineering, high‐mobility graphene synthesis, and tailored surface chemistry push detection limits is highlighted, while discussing emerging strategies ...
Co Dang Pham +4 more
wiley +1 more source
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim +6 more
wiley +1 more source
The Important Factors in Security for Introducing the Cloud Services [PDF]
Young Bae Yoon +2 more
openalex +1 more source

